Wed.Feb 05, 2020

article thumbnail

FBI Reportedly Says DDoS Attack Targeted Voter Registration

Data Breach Today

State Voter Registration Website Repeatedly Targeted The FBI reportedly warned this week that attackers repeatedly attempted to disrupt a state's voter registration and information website with a distributed denial-of-service attack.

275
275
article thumbnail

When Your Used Car is a Little Too ‘Mobile’

Krebs on Security

Many modern vehicles let owners use the Internet or a mobile device to control the car’s locks, track location and performance data, and start the engine. But who exactly owns that control is not always clear when these smart cars are sold or leased anew. Here’s the story of one former electric vehicle owner who discovered he could still gain remote, online access to his old automobile years after his lease ended.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Ransomware Targets Industrial Controls: Report

Data Breach Today

Dragos Researchers Describe Potential Threat Posed by Ekans Ransomware Ekans, a recently discovered ransomware variant that's designed to target industrial control systems, appears to have some of the same characteristics found in Megacortex, malware that struck several high-profile targets in 2019, according to the security firm Dragos.

article thumbnail

Keep the train rolling: partner momentum in the data science market

IBM Big Data Hub

How has the newer data science technology such as Watson Studio, Watson Machine Learning and Watson OpenScale been picked up by the business partner community? I mentioned in our previous blog that I was pleasantly surprised at how many IBM Business Partners have established a Data Science practice. The new data science technology has been very well received by our partner community.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Malware Attack 'Damages' Patient Records

Data Breach Today

Orthopedic Clinic in Houston Tight-Lipped About Malware Attack Details A Texas orthopedic practice says a recent malware attack "permanently damaged" thousands of electronic patient records. It's the latest in a string of healthcare incidents in which various forms of malware rendered records inaccessible.

IT 179

More Trending

article thumbnail

Britain's 5G Lesson: Choose or Choice Will Be Made for You

Data Breach Today

Delay in Decision-Making Left Government With Little Room to Maneuver British leaders' failure to more quickly choose and pursue a specific path for the nation's 5G rollout meant that ultimately, the decision got made for them, despite many security concerns persisting over the use of Chinese-built telecommunications gear.

article thumbnail

Expert released PoC exploit code for unpatched backdoor in HiSilicon chips

Security Affairs

Researcher published details about a backdoor mechanism he found in HiSilicon chips, but he did not report it to the vendor due to the lack of trust in it. The Russian security expert Vladislav Yarmak has published technical details about a backdoor mechanism he discovered in HiSilicon chips. The backdoor mechanism could allow attackers to gain root shell access and full control of device.

article thumbnail

Australian Delivery Firm Confirms Ransomware Attack

Data Breach Today

Toll Group Attempts to Restore Systems; Some Deliveries Delayed Australian transportation and logistics firm Toll Group has confirmed that it sustained a ransomware attack earlier this month that has forced the company to shut down several of its systems and led to delays in deliveries.

article thumbnail

Cisco Flaws Put Millions of Workplace Devices at Risk

WIRED Threat Level

Five vulnerabilities in Cisco Discovery Protocol make it possible for a hacker to take over desk phones, routers, and more. .

Risk 102
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ireland's Privacy Watchdog Probing Google's Data Use

Data Breach Today

Investigation Comes After Numerous Consumer Complaints Ireland's Data Protection Commission is launching an investigation into how Google uses customer data for its location services after the privacy watchdog received numerous complaints from consumer rights organizations across the European Union.

Privacy 147
article thumbnail

European parliament says it will not use facial recognition tech

The Guardian Data Protection

Statement comes after leaked memo on use of technology in security provoked outcry The European parliament has insisted it has no plans to introduce facial recognition technology after a leaked internal memo discussing its use in security provoked an outcry. A page on the European parliament’s intranet, seen by the Guardian, suggested that facial recognition could be used “in the context of biometric-based security and services to members [MEPs]”.

IT 75
article thumbnail

Dropbox paid more than $1 Million via its bug bounty program

Security Affairs

File hosting service company Dropbox paid out $1 million for vulnerabilities reported by researchers through its bug bounty program. Since the launch of its bug bounty program in 2014, the file-hosting company Dropbox has paid out $1 million to date for vulnerabilities reported by researchers. “Our bug bounty program recently passed a significant milestone.

IT 75
article thumbnail

Behind the scenes work is key to CPOE success

OpenText Information Management

When a clinical lab places a key part of their business operation in another company’s “hands“, they trust that the partner’s entire team understands the importance of tailoring a lab integration solution to meet the specific needs of each lab or imaging client. As one of the people present at the start of OpenText™ EMR-Link™, … The post Behind the scenes work is key to CPOE success appeared first on OpenText Blogs.

Cloud 70
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

Threatpost

A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages.

article thumbnail

Vixie: The Unintended Consequences of Internet Privacy Efforts

Dark Reading

Paul Vixie says emerging encryption protocols for endpoints could 'break' security in enterprise - and even home - networks.

Privacy 85
article thumbnail

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

Threatpost

The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets. Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […].

article thumbnail

Department of Energy Adds Attivo Decoys for Critical Infrastructure Security

Dark Reading

The decoys and lures will help redirect attacks away from devices that can't be protected through traditional means.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

Threatpost

Malware campaign targets global manufacturers that are still dependent on Windows 7 subsystems to run fleets of IoT endpoints.

article thumbnail

IoT Malware Campaign Infects Global Manufacturing Sites

Dark Reading

The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.

article thumbnail

Thank you, City of Port Arthur!

The Texas Record

Last week, Bonnie Zuber and I were given the opportunity to speak to various local entities about managing electronic records. To say it was lively would be an understatement! Thank you all for being engaged with our material and thinking of innovative solutions to managing electronic records. Bonnie and I felt more than welcome by every Port Arthur official in attendance.

article thumbnail

CamuBot Banking Trojan Returns In Targeted Attacks

Threatpost

The malware is back in targeted attacks against Brazilian banking customers, this time using a new technique that involves mobile app authorization.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Top AI trends to expect in manufacturing, agriculture and government

Information Management Resources

While it’s impossible to predict the future with certainty, technologies that incorporate AI and automation are maturing at an incredibly rapid rate across some industries.

article thumbnail

What is a Privileged Access Workstation (PAW)?

Dark Reading

Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.

Access 58
article thumbnail

Maryland Court Finds Coverage for Lost Data and Slow Computers After Ransomware Attack

Hunton Privacy

As previously posted on our Hunton Insurance Recovery blog , a Maryland federal court awarded summary judgment to policyholder National Ink in National Ink and Stitch, LLC v. State Auto Property and Casualty Insurance Company , finding coverage for a cyber attack under a non-cyber insurance policy after the insured’s server and networked computer system were damaged as a result of a ransomware attack.

article thumbnail

Emotet Preps for Tax Season with New Phishing Campaign

Dark Reading

Malicious emails in a new attack campaign contain links and attachments claiming to lead victims to W-9 forms.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Data strategy in three steps: Inside Collibra’s Data Office

Collibra

Got the Data Technologies, the Data Team and the Data? You better have a Data Strategy. Inside most modern organizations, we have a data office, we have data gathering and analytics technologies, we have a Chief Data Officer, and of course, we have the data. Lots and lots of data. But what about a data strategy? . This is a critical contingency — and to get it right, we need to identify what makes up a data strategy, how it comes together and what role it plays within the overall business strate

article thumbnail

Hiring Untapped Security Talent Can Transform the Industry

Dark Reading

Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting

article thumbnail

Supporting the Next Generation in STEM

Rocket Software

Rocket Software was founded on the belief that innovation and technology have the power to create change in the world and create legendary results. This change can happen at any level, from small, personal aspirations to worldwide developments. At Rocket, we strive to develop technology and programs that drive and power these innovative changes. And we are constantly searching for ways to inspire the individuals who may spark innovations through initiatives like Rocket.Build, internship programs

IT 49